Skip to main content
guest
Join
|
Help
|
Sign In
ACG 6415
Home
guest
|
Join
|
Help
|
Sign In
ACG 6415
Wiki Home
Projects
Recent Changes
Pages and Files
Members
Home
Syllabus - Spring 2018
Schedule - Spring 2018
Class Readings
Class Slides
Access Control Simulation
Course Videos
TYU Solutions
GAO Reports
Security Certifications
Resources
Frameworks & Standards
Threat Statistics
Phishing
Security in the News
Technology Radar
AIS/CPA Exam
Wiki Information
Resources
Edit
44
…
0
Tags
No tags
Notify
RSS
Backlinks
Source
Print
Export (PDF)
TCP.pdf
Details
Download
33 KB
Wireshark Capture
Password Resources:
A
Strong Password Generator
GRC's Interactive Brute Force Password “Search Space” Calculator
zxcvbn password Tests
zxcvbn: realistic password strength estimation
Yahoo! on-demand passwords
Secure File Transfer:
poetic.io
TCP & UDP Port Numbers
Internet Control Message Protocol
Ping and Traceroute from within UCF
UCF's VPN Page
Ping.eu
Open Web Applications Security Project
Industry Botnet Group
Reporting Computer, Internet-related, or Intellectual Property Crime
SHODAN Search Engine
(Example of SHODAN
search
)
Cyber Security Road Map for Businesses
Mac OS X secure/private web browser -
Aviator
Web 2.0 scientific calculator
RSA Calculator
Market Share Stats:
DNSEC
Start.com SSL certificates
Online Encryption
Secure Mobile Communication - Wickr
Electronic Frontier Foundation -
HTTPS Everywhere
Universal Plug and Play (UPnP) Security Check
ArsTechnica Guide to Online Security
GPU Bruteforcer Crack Time
GPUBruteForcer_Hashtimes.xls
Details
Download
15 KB
GPU Crack Times Examples
GPUCrackingTimes.xlsx
Details
Download
32 KB
Forefront TMG Capacity Planning Tool.xlsm
Details
Download
148 KB
USGCB-Settings-Major-Version-1.2.x.0.xls
Details
Download
396 KB
NIST Checklist for Internet Explorer
U.S. Department of Defense - Cybersecurity
Apple iOS Security (February 2014):
iOS_Security_Feb14.pdf
Details
Download
2 MB
WireShark Capture:
testpacket.xls
Details
Download
360 KB
RSA Example:
RSAEncryptionExample.xls
Details
Download
12 KB
Security White Papers:
PWC - 2015 US Cyber Crime Report
2015-us-cybercrime-survey.pdf
Details
Download
618 KB
2013 Cost of Data Breach Study: Global Analysis (Ponemon Institute, 2013)
053013_GL_NA_WP_Ponemon-2013-Cost-of-a-Data-Breach-Report_daiNA_cta72382.pdf
Details
Download
2 MB
DataBreachCosts.ppt
Details
Download
5 MB
Software Security Readings:
2011 Wysopal.PDF
Details
Download
3 MB
(State of Software Security Report, Veracode)
The Crash Report
Software Insecurity Thrives
SOPHOS Security Threat Report 2012
SophosSecurityThreatReport2012.pdf
Details
Download
3 MB
OWASP Top
Javascript Required
You need to enable Javascript in your browser to edit pages.
help on how to format text
Turn off "Getting Started"
Home
...
Loading...
Password Resources:
Secure File Transfer:
TCP & UDP Port Numbers
Internet Control Message Protocol
Ping and Traceroute from within UCF
UCF's VPN Page
Ping.eu
Open Web Applications Security Project
Industry Botnet Group
Reporting Computer, Internet-related, or Intellectual Property Crime
SHODAN Search Engine (Example of SHODAN search)
Cyber Security Road Map for Businesses
Mac OS X secure/private web browser - Aviator
Web 2.0 scientific calculator
RSA Calculator
Market Share Stats:
DNSEC
Start.com SSL certificates
Online Encryption
Secure Mobile Communication - Wickr
Electronic Frontier Foundation - HTTPS Everywhere
Universal Plug and Play (UPnP) Security Check
ArsTechnica Guide to Online Security
GPU Bruteforcer Crack Time
GPU Crack Times Examples
U.S. Department of Defense - Cybersecurity
Apple iOS Security (February 2014):
WireShark Capture:
RSA Example:
Security White Papers:
Software Security Readings: